Source | Azure Portal | ||||||||||||||
Display name | [Deprecated]: App Services should disable public network access | ||||||||||||||
Id | 63a0ac64-5d5f-4569-8a3d-df67cc1ce9d7 | ||||||||||||||
Version | 1.0.0-deprecated Details on versioning |
||||||||||||||
Versioning |
Versions supported for Versioning: 1 1.0.0 (1.0.0-deprecated) Built-in Versioning [Preview] |
||||||||||||||
Category | App Service Microsoft Learn |
||||||||||||||
Description | Disabling public network access improves security by ensuring that the App Service is not exposed on the public internet. Creating private endpoints can limit exposure of an App Service. Learn more at: https://aka.ms/app-service-private-endpoint. | ||||||||||||||
Cloud environments | AzureCloud = true AzureUSGovernment = unknown AzureChinaCloud = unknown |
||||||||||||||
Available in AzUSGov | Unknown, no evidence if Policy definition is/not available in AzureUSGovernment | ||||||||||||||
Mode | Indexed | ||||||||||||||
Type | BuiltIn | ||||||||||||||
Preview | False | ||||||||||||||
Deprecated | True | ||||||||||||||
Effect | Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
||||||||||||||
RBAC role(s) | none | ||||||||||||||
Rule aliases | THEN-ExistenceCondition (1)
|
||||||||||||||
Rule resource types | IF (1) |
||||||||||||||
Compliance | Not a Compliance control | ||||||||||||||
Initiatives usage | none | ||||||||||||||
History |
|
||||||||||||||
JSON compare |
compare mode:
version left:
version right:
|
||||||||||||||
JSON |
|